Hottest products at RSA Conference 2013

Our roundup of new security products on hand at this week's show.

The annual RSA Conference, held since 1991, this year will attract 350+ exhibitors to San Francisco, where products showcased will include mobile device security offerings, key management tools, anti-malware gear and more. (For a look back at 2012's show, click here.)

Key features: • Keystroke Encryption encrypts all data typed into the on-screen keyboard, protecting user credentials and online transactions from mobile keylogging malware. • Password vault stores all passwords for internal networks and external cloud services in an encrypted database, enables corporate users to securely login to any website or VPN directly from within the MobileTrust application. • Strong password generator enables users to create and store hard-to-crack passwords. This is especially important since most users use easy-to-guess passwords. • Provides two-factor authentication for login access to internal or external sites that comply with the OATH standard. This eliminates the need of using expensive physical token solutions.

Key features: ForeScout integrated its network access control and endpoint compliance with Citrix XenMobile MDM to allow IT organizations better security, compliance and control for all endpoints on an enterprise network. More info.

Pricing: LM is priced based on log data volume we process for a customer. Customers buy based on number of gigabytes of log data we archive per day with pricing starting at $100/mo for small volume environments. A typical customer with 25 log sources will likely generate about 1 GB of log data per day, which has a list price of $900/mo. This comes with 1 year of log retention. If the customer wanted to only store the log data for 90 days, that price would drop to $360/mo.

Key features: Allows users to manage log data from all of their infrastructure – including environments inside enterprise data centers all the way through fully elastic public clouds – in a single console. More info.

Key features: Provides enterprises with full visibility and management over security and compliance issues within their secure shell environments; delivering an essential first step in asserting controlover encrypted networks. More info.

Key features: Cloud-based global hacker database system that uses Juniper’s Intrusion Deception technology to identify and track individual attackers based on device attributes and shares those profiles broadly across its subscriber base. More info.

Key features: DigitalQuick encrypts files saved to the cloud (as well as the desktop) using advanced security protocols. It’s the only service that can add specific permissions and restrictions to encrypted data. More info.

Key features: DefensePipe is a solution to help mitigate DDoS attacks that threaten to saturate the Internet pipe. The combination of an on-premise attack mitigation system and DefensePipe provide maximum security coverage. More info.